Skip to main content

标 题: 刚刚填了EVUS,分享经验

发信人: memajia (新一代), 信区: Reunion
标  题: 刚刚填了EVUS,分享经验
发信站: BBS 未名空间站 (Wed Dec  7 15:19:37 2016, 美东)

早听说了这套系统,但到自己头上就忘了。爸妈上个月拿到十年签证,明天就过来,今
天午餐时候才让同事提醒这事,瞬间头大,赶紧把半夜睡着的爸妈叫醒,要了刚发的签
证照片(发现上面提醒要注册的)。好在,实际不难,只要10-20分钟就搞定,而且马
上更新,不用等个24-48小时什么的。所以最坏情况,出发当天也是可以搞定的:)。

需要材料:
1。DS160信息(不是确认页,完整版那个)
2。十年签证页

提交网址:www.evus.gov

攻略:
视频版
https://www.cbp.gov/newsroom/video-gallery/video-library/how-enroll-evus

基本上你填过DS160,这个就不算什么,几个值得提的地方如下:
1. 如果你有两个人或更多,可以用group enrollment。
2。虽然要的信息很多,但是你输入了开始的基本信息后,系统就会自动根据DS160信息
填上其他部分(~80%左右空)。
3。会问爸妈父母(也就是我们的爷爷奶奶)的中文姓名,但是那个不是必填的,所以
我就都跳过了。
4。提交后刚状态开始会显示"Pending",但就过了几分钟就变成"Enrolled"
5。目前整个过程没有收钱。
6。最终父母不必打印任何东西入关或者记住任何号码,甚至不必知道你做过这些:)。

10-20分钟就能填完。剩下的就是仔细了,因为大部分不能修改,填错了就只能重新提
交。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...